We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

Essay on Computers

Select category
Sort by
Automted Voting System

On the previous years the University experiencing the manual based election system. Having this manual based system, the university experienced all the consequences. The researcher no longer wants to experience this again that’s why the system was being developed. It is the answer for all the miscalculations done by the manual system. Automated voting system could do more jobs than the election ...

Unit 30: Digital Graphics P1, M1

Natural artists tend to use pencil and paper to create pictures; however, modern day artists tend to use more digitally based methods such as Adobe Photoshop. If this is the case, then you may find that the graphics tablet is a good piece of hardware to use. With average tablets having 2048 levels of pressure making it easier for artists to draw thicker lines when they press harder on the tablet. ...

Java Programming: Mutator Method Assignment Q&A

[Assessment 2(17): You must have this exercise signed off by your class supervisor] Add a further field, of your choosing, to the Track class, and provide accessor and mutator methods to query and manipulate it. Find a way to use this information in your version of the project; for instance, include it in a track’s details string, or allow it to be set via a method in the MusicOrganizer class....

Save Time On Research and Writing

Hire a Pro to Write You a 100% Plagiarism-Free Paper.

Get My Paper
Case Study Examples

Quantitative responses were analyzed by using descriptive statistics. Descriptive statistics are used to describe the basic features of the data in a study. It provides simple summaries about the sample and the measures. Together with simple graphics analysis, it forms the basis of virtually every quantitative analysis of data. Weighted arithmetic mean and frequency of the questionnaire items were...

Improving IDI’s computer network infrastructure

There are a variety of servers, switches, routers, and internal hardware firewalls. Each of the organization’s locations is operating with different information technologies and infrastructure—IT systems, applications, and databases. Various levels of IT security and access management have been implemented and embedded within their respective locations. The information technology infrastructur...

What's a Mail Merge?

No need for expensive letterhead: Printing letters on company letterhead may appear much more professional and attractive, but this can become very expensive. We can create a letterhead that is identical to your company letterhead and insert this into your merged letters. Therefore the merged letters and company letterhead will print as one letter on blank paper. We suggest printing on "Bond" pape...

Critical Analysis of Billing System

In a study in India, the Hyderabad Metro Water Supply and Sewerage Board introduced a spot billing scheme for billing its water connections. This helped reduce the billing cycle from three weeks to one day, which in turn resulted in increased cash flow (Agarwal 2008). The Board initially outsourced the billing function to a private party that had relevant experience. Through handheld data logger m...

The Computerized System

Also called POS or checkout, during computerization later becoming electronic point of sale or EPOS) is the place where a retail transaction is completed. It is the point at which a customer makes a payment to the merchant in exchange for goods or services. At the point of sale the retailer would calculate the amount owed by the customer and provide options for the customer to make payment. The me...

The Evolving Strategy of IBM Company

In 1990 IBM started to move away from the multinational enterprise and into a globally integrated enterprise. This meant that they focused on “economics, expertise, and the right business environment.” The reason for this shift was due to “the globalization of the world economy, the global nature of many of IBM customers … and the emergence of fierce competition from enterprises in emergin...

Intel vs AMD for Personal Computer

For gamers who are generally under the age of 30, this difference in price makes AMD the favorable processor. To those who have the money and are looking for performance Intel would be the better choice. According to Shulka (2012), “ (Intel) prices will be slightly on the higher side compared to AMD, but given the consistency, superior performance specs and its downward- traveling energy consump...

Cybercrime Continue to Rise

We need to intensify education and awareness efforts to educate users on Internet risks,” he said. Husin said Cybersecurity Malaysia is open to the idea of working with security solution providers like Symantec to come up with cybersecurity awareness programmes. Cybersecurity Malaysia already has a list of home-made security tools such as DontPhishMe, DNSwatch and MyPHPiPs that protects users fr...

Internet Cafe: Rationale of the Study

What we focused in our study in the Internet Café Monitoring System which deals with the process involved within the system. With this, the user can easily access data or information in just a span of time, the system is manageable, accessible and it is very easy to use thus the user can see the effectiveness and advantages of the computer accessing information just like what this system can do. ...

Electronic-Based Medical Record

Paper charts that are outdated, that are deemed inactive or charts of patients who expired will have to be placed in boxes and put into storage (Hamilton, 2010). There are vast differences between paper-based and electronic medical record-keeping systems. One system is entirely manual while the other requires manual data entry combined with computerization. For decades, physicians and staff of med...

Dot Matrix Printers

Dot matrix printers are still commonly used in low-cost, low-quality applications like cash registers, or in demanding, very high volume applications like invoice printing. The fact that they use an impact printing method allows them to be used to print multi-part documents using carbonless copy paper, like sales invoices and credit card receipts, whereas other printing methods are unusable with p...

The Impact That File Format, Compression Techniques Image Resolution

If you have 3. 1 megapixel images on a mobile phone then the quality is average whereas, if you have a camera with 12. 1 megapixels, this would produce a good clarity and be able to see the details in all images and video. The disadvantage is that, the higher the number of pixels in an image, the more space it will need to be stored on either the phone or on a camera. For this, you would need a la...

Applications of Augmented Reality

The production and manufacturing sectors have also made complete use of the concept for the development of better packaging styles and manufacturing procedures. Fields like navigation, tourism, translation and industrial design also make use of augmented reality in different ways. The application of the augmented reality techniques and concept makes the industries and fields much more advanced for...

Verification vs Validation

The traditional method of creating Systems Engineers was to select well-organized engineers with lots of common sense and let them acquire 30 years of diverse engineering experience. But recently these traditional Systems Engineers have written books and standards that explain what they do and how they do it. So now that the tools, concepts and procedures have been formalized, in four years of und...

Executive Support System

Document Image Processing - This is a form of electronic filing. A document can be passed through a scanner, translated into digital form and stored. Barclays Bank use an optical disk to store their files, they find this system very valuable because of the amount of customer letters that they receive and send out. It is important that they keep all of these letters and so this system is used to do...

The Battle Of Operating Systems

To determine the better of the operating systems, a second variable: User Level must be added. From the information gathered, Windows is and probably always will be the best choice for first time and beginner computer users, with its easy-to-navigate database and inbuilt support help it is obvious that Microsoft's goal was to target this demographic. Linux however would be recommended to intermedi...

Unit 9 - computer Networks

TCP/IP and OSI models are layered models that specifies which protocols will operate at each layer in the TCP/IP model they have 4 layers and it supervises the separation of data into packets it is operated/controlled by the IETF the top layer is the application layer is used to collect and distribute data in a suitable format for transmission the protocols that it uses are the DNS, DHCP, FTP. The...

Altered Images and Videos

Alterations to deceive humans has been done since the World War 1. "A picture is worth a thousand lies: photographic deceptions" (Orwell, 1984). As the tools to edit and alter images have become cheap and easily available, anyone can use them to intensify images. Leading manufactures in the camera industry attempted to resolve these issues by introducing secure digital certificates. Technology fou...

5 Things Your Employees Are Doing That Will Get You Hacked

More than ninety percent of cyber attacks start out in this way; this is supported by PhishMe, which is a cyber security company.  Phishing deceives the receipt into thinking that the email address included in the message is real or represents another account. For example, you have a PayPal account and you are sent an email, supposedly from PayPal asking you to verify your payment. However, when ...

Analysis of the al-Shamoon Virus Attack

The losses arising from this incidence clearly goes further than the IT department. Assuming that the company’s oil production activities were not affected in any way and that, in the company’s vice president’s words “not a single drop of oil was lost”, the issue of reduced productivity in as far as human resources are concerned still arises meaning that there were still more losses than...

Install Apache Web Server

After select execute the vulnerability scan Nessus console will display the scanning status click "Close" to complete the session as the figure Step 4: Generate Vulnerability Report In the Manage Session Results screen high light the session of previously generated select "Report" and export to PDF format as the figure Network Vulnerability Assessment Report The Nessus network vulnerability assess...

Enterprise Management Solution by Microsoft

The major competitors of Microsoft are IBM and Oracle but in comparison Microsoft has the largest market share. IBM and Oracle already have project management soft wares but not as extensive as Enterprise Management Software. The features offered by Microsoft are more, in comparison to any of the existing soft wares offered by the competitor companies. This provides Microsoft Corporation with a co...

The Ioko, Vignette and Sun Microsystems partnership

Combined platform, will help in the reduction of costs in terms of content delivery and make it easier for identification of consumers by companies in terms of demands and tendency though report and analytical tools. This will enable the companies to give response to the market tendency quickly hence offering compelling new content at earlier stages. Provision of approach into the consumption of c...

Connex Atom Notebook

Computers are a part of almost every industry today, they are no longer limited any specific field. They can be used for home use, entertainment, browsing and business-related purposes and for various developmental, industrial and manufacturing, designing purposes, data storage and in the processing and presentation of information. In addition, with the advancements of hardware as well as software...

Are You on a Short Deadline?
Let a Professional Writer Help You

Get help
Check Writers' Offers

What's Your Topic?

Hire a Professional Writer Now

The input space is limited by 250 symbols

What's Your Deadline?

Choose 3 Hours or More.
2/4 steps

How Many Pages?

3/4 steps

Sign Up and Get Writers' Offers

"You must agree to out terms of services and privacy policy"
Get Offer
Write my paper

Your Answer is very helpful for Us
Thank you a lot!